期刊文献+

网格下基于模糊逻辑的信任修正模型

A trust revision model based on fuzzy logic in grid environment
下载PDF
导出
摘要 随着网格系统研究与应用的深入,网格环境下的信息安全问题成了一个突出矛盾.针对主观信任的模糊性,运用模糊逻辑理论对网格环境的信任管理问题进行建模,给出了主观信任的描述机制和信任的评价机制,对信任的传递过程进行推理,综合考虑节点的历史信息,使信任度的计算更加符合实际.同时,针对网络中普遍存在的恶意推荐与攻击,给出了有效的防止策略. With the deepening research and application of the grid system, the information security has become a prominent contradiction in the grid environment. For the fuzzy nature of subjective trust, this paper establishes a trust management model for grid environment with the theory of fuzzy logic. In this model, the description and evaluation mechanisms of subjective trust are given and the trust transfer process is reasoned. In the process of reasoning, the history information of the node is considered, so that the degree of confidence can be calculated more realisticly. Finally, an effective prevention strategy against the prevalent malicious recommendations and attack in the network is given.
出处 《河南工程学院学报(自然科学版)》 2013年第2期57-62,共6页 Journal of Henan University of Engineering:Natural Science Edition
基金 河南省科技计划项目(122300410174)
关键词 网格技术 信任管理 主观信任 模糊逻辑 信任推理 grid technology trust management subjective trust fuzzy logic trust reasoning
  • 相关文献

参考文献8

  • 1Blaze M, Kannan S, Lee I, et al. Dynamic trust management[ J]. Computer,2009,42 (2) :44 - 52.
  • 2Yu B, Singh M P, Sycara K. Developing trust in large - scale peer - to - peer systems [ C ]//2004 IEEE 1st Symposium on Multi -Agent Security and Survivability. New York :Institute of electrical and Electronics Engineers Inc,2004.
  • 3Azzedin F, Maheswaran M. Evolving and managing trust in grid computing systems[ C ] //Proceedings of IEEE Canadian Confer- ence on Electrical&Computer Engineering. Winnipeg:IEEE Press,2002.
  • 4Wang Y, Vassileva J. Bayesian network - based trust model in peer - to - peer networks [ C ]//Moro G. Proceedings. of the 2nd Int' 1 Workshop on Agents and P2P Computing. Berlin:Springer- Verlag,2004.
  • 5Jameel H,Hung L X,Kalim U, et al. A trust model for ubiquitous systems based on vectors of trust values[ C] //Proceedings. of the 7th IEEE Int' 1 Symp. Washington:IEEE Computer Society Press,2005.
  • 6Song S H, Wang K. Fuzzy trust integration for security enforcement in grid computing [ C ] // The Int' 1 Symp. on Network and Parallel Computing. Berlin : Springer - Verlag,2005.
  • 7唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 8Sun Y, Yu W, Han Z. Information theoretic framework of trust modeling and evaluation for Ad hoc networks [ J ]. IEEE Journal on Selected Areas in Communications,2006, 249(2) :674 -679.

二级参考文献10

  • 1M. Burrows, M. Abadi, R. M. Needham. A logic of authentication. The Royal Society of London, DEC Systems Research Center, Tech. Rep.: 39, 1989.
  • 2R. Yahalom, B. Klein, Th. Beth. Trust relationships in secure systems-A distributed authentication perspective. In: Proc.1993 IEEE Symposium On Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150~164.
  • 3A. Jφsang. Prospectives for modeling trust in information security. Information Security and Privacy, Second Australasian Conf., ACISP'97, Syndey, NSW, Australia, 1997.
  • 4T. Beth, M. Borcherding, B. Klein. Valuation of trust in open networks. In: Proc. European Symposium on Research in Security (ESORICS). Berlin: Springer-Verlag, 1994. 3~18.
  • 5A.J. Sang. A logic for uncertain probabilities. Int'l Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279~311.
  • 6E. Gerck. Toward real-world models of trust: Reliance on received information. http: ∥ www. mcg.org. br/trustdef. htm,1998.
  • 7D. Gambetta. Can we trust trust? In: Trust: Making and Breaking Cooperative Relations (Electronic edition), Department of Sociology, University of Oxford, Chapter 13. http: ∥www. sociology. ox. ac. uk/papers/gambetta 213 ~ 237. pdf, 2000.213~237.
  • 8LA扎德.模糊集合、语言变量及模糊逻辑[M].北京:科学出版社,1982.63-84.
  • 9C. C. Lee. Fuzzy logic in control systems: Fuzzy logic controller-Part Ⅱ. IEEE Trans. System, Man, and Cybernetics, 1990, 20(2): 419~435.
  • 10唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236

共引文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部